Cyber attacks cost UK businesses £18 billion in lost revenue and £16 billion in increased IT spending per year as a result of breaches. And the issue is widespread, 81 percent of UK businesses reported a breach in 2014. Register today for this free webcast to find out more as we discuss..

Following the outstanding success of our 2015 event, SC Congress is returning to London on 10 February 2016. Join hundreds of your information security colleagues to hear the latest news and analysis and to experience the latest solutions in cyber-security. Register today for free.

An SSH attack is a type of dictionary attack which aims to guess secure shell client usernames and passwords.

Writing
in the ISC's website diary, incident handler Scott Fendley warned
security professionals to be aware of what he called a "significant new
trend".

He linked to statistics produced by denyhosts.net, a site
which offers a script to defend against SSH hacking attempts, which
showed a huge spike in SSH attacks on Monday. In total, the site found
nearly 10,000 SSH attacks on that one day: the daily norm is roughly
2,000. He added that anecdotal evidence from mailing lists confirmed
the trend.

"This does appear to be a significant new trend of
which we all should be aware," wrote Fendlay, who is also a security
analyst at the University of Arkansas.

He suggested businesses should check which of their servers have SSH open to outsiders on the default port. He also suggested:

- Using host-based tools such as DenyHosts, fail2ban or BlockHosts in conjunction with TCP-Wrappers to block access to servers;
- Disabling access to the root account;
- Making sure usernames were not easily guessable;
- Using multiple factors of authentication or public keys if possible;
-
Generally reducing the number of publicly accessible services through
iptables or similar host-based security measures, in addition to using
network firewalls.

Fendley said that hackers were trying to avoid
detection by launching 'low and slow' attacks which avoid locking out
accounts and being detected by intrusion detection systems. Some
attackers were using botnets to perform distributed attacks to keep
under detection thresholds, he said.

Fendley linked to a whitepaper from New York's Clarkson University which investigated methods used in brute-force SSH attacks.

SANS
last year noted the widespread nature of brute-force password-guessing
attacks. It said such attacks against SSH, FTP and Telnet servers were
"the most common form of attack to compromise servers facing the
internet."

SC Magazine arms information security professionals with the in-depth, unbiased business and technical information they need to tackle the countless security challenges they face and establish risk management and compliance postures that underpin overall business strategies.